Proof of execution using random function
Proofs of work and bread pudding protocols
Proofs of work and bread pudding protocols
Protected platform identity for digital signing
Protectedly reading out an enciphered, cryptographic key
Protecting against spoofed DNS messages
Protecting content from illicit reproduction by proof of...
Protecting content from illicit reproduction by proof of...
Protecting content from illicit reproduction by proof of...
Protection of the distribution of digital documents in a...
Providing a configuration file to a communication device
Providing apparatus, providing method, communication device,...
Providing tokens to access extranet resources
Provisional signature schemes
Public cryptographic control unit and system therefor
Public key based authentication method for transaction...
Public key certificate generation method, validation method...
Public key cryptographic method based on braid groups
Public key cryptosystem with roaming user capability
Public key distribution using an approximate linear function